Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions…
8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report…
Watch out, hackers are targeting CVE-2018-0296 Cisco fixed in 2018
Cisco has warned customers that hackers continue to target Cisco ASA and Firepower Appliance products by exploiting the CVE-2018-0296 flaw. Experts warn that threat actors continue to exploit the CVE-2018-0296…
The Rise of Cybercrime-As-A-Service
And What It Means for Businesses By Mark Belgrove, Head of Cyber Consultancy, Exponential-e In a sea of increasingly complex cyber warfare and nation-state hackers, it can be easy to…
The Blockchain And Wireless Technologies
By Milica D. Djekic A Perspective The Blockchain by itself is any well-protected record of data that is transmitted through a cryptographically assured communications channels. It may appear that such…
How to Become a Cybersecurity Sleuth?
By Edith Santos, Director of Global Incident Response for NTT, Ltd. So, you want to become a cybersecurity sleuth? Excellent! We need you and so does everyone else. A quick…
Cyber Safety Tips for The Holidays
Practicing Good Cyber Hygiene to Avoid Holiday Cyber Attacks By Dr. Bob Duhainy, Walden University Doctor of Information Technology core faculty member While millions of holiday shoppers will be spending money…
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days…
BeyondTrust Cybersecurity Predictions for 2020 & Beyond
2020 Prediction Contributors: Morey Haber, CTO/CISO at BeyondTrust and Christopher Hills, Sr. Solutions Architect, Office of the CTO at BeyondTrust It’s possible that the earliest security predictions began on that…
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research…
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an…
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and…